166 Hits in 6.1 sec

5. From Frequencies to Vectors [chapter]

2020 Engines of Order  
They also introduce some of the fundamental mathematical formalisms and methods running through information ordering, preparing the extension to digital objects other than text documents.  ...  In the context of information retrieval, the 1950s were mainly dedicated to exploring the concrete possibilities of novel hardware for document search, while the conceptual side revolved in large parts  ...  well-defined formal models.  ... 
doi:10.1515/9789048537419-007 fatcat:phrm7efpavebdmwpis53lzsmpe

Computational Creativity

Rania A. Hodhod, Brian S. Magerko
2014 International Journal of Cognitive Informatics and Natural Intelligence  
As the field has continued to grow, the time has come for the creation of a more formal, even archival, forum for work in computational creativity and this year we took the leap.  ...  We are gratified to note that we received 53 paper submissions as well as 12 show and tell submissions.  ...  Acknowledgements This research was funded by a grant from the Canada Council for the Arts and the Natural Sciences and Engineering Research Council of Canada.  ... 
doi:10.4018/ijcini.2014040101 fatcat:t75r5mrudzckfm3cjskssgadma

On the Opportunities and Risks of Foundation Models [article]

Rishi Bommasani, Drew A. Hudson, Ehsan Adeli, Russ Altman, Simran Arora, Sydney von Arx, Michael S. Bernstein, Jeannette Bohg, Antoine Bosselut, Emma Brunskill, Erik Brynjolfsson, Shyamal Buch (+102 others)
2021 arXiv   pre-print
This report provides a thorough account of the opportunities and risks of foundation models, ranging from their capabilities (e.g., language, vision, robotics, reasoning, human interaction) and technical  ...  Despite the impending widespread deployment of foundation models, we currently lack a clear understanding of how they work, when they fail, and what they are even capable of due to their emergent properties  ...  In addition, we would like to especially thank Vanessa Parli for helping to organize this effort.  ... 
arXiv:2108.07258v2 fatcat:yktkv4diyrgzzfzqlpvaiabc2m

Adversarial Web Search

Carlos Castillo
2010 Foundations and Trends in Information Retrieval  
be modeled formally as a game [106] .  ...  authors as well as for the users.  ... 
doi:10.1561/1500000021 fatcat:toxnvajrmbdppf5hytdbnykuiq

Nonlinear Dimensionality Reduction Methods in Climate Data Analysis [article]

Ian Ross
2009 arXiv   pre-print
The three methods used here are a nonlinear principal component analysis (NLPCA) approach based on neural networks, the Isomap isometric mapping algorithm, and Hessian locally linear embedding.  ...  Linear dimensionality reduction techniques, notably principal component analysis, are widely used in climate data analysis as a means to aid in the interpretation of datasets of high dimensionality.  ...  It is of interest to determine how well NLPCA (and the other methods explored here) can capture the differences in behaviour seen in different models, and to see whether these nonlinear methods can represent  ... 
arXiv:0901.0537v1 fatcat:2ethc7ddtjdyxkbqzmtg64upwi

Multidimensional Point Transform for Public Health Practice

P. AbdelMalik, M. N. Kamel Boulos
2011 Methods of Information in Medicine  
In response to this clash, a number of solutions and workarounds are proposed in the literature to compensate for location privacy.  ...  For each aspect of the study, a tool prototype and/or design for implementation is proposed and explained, and the need for further development of these is highlighted.  ...  We wish to thank David Paton (Canadian Institute for Health Information) for his feedback on an earlier version of this paper.  ... 
doi:10.3414/me11-01-0001 pmid:21691675 fatcat:l7rjqvc6dzfdvmg47ew2eacrxy

A survey of statistical user simulation techniques for reinforcement-learning of dialogue management strategies

2006 Knowledge engineering review (Print)  
The main motivation is the hope of building systems that learn through trial-and-error interaction what constitutes a good dialogue strategy.  ...  This requirement for training statistical dialogue models has created an interesting new application area for predictive statistical user modelling and a variety of different techniques for simulating  ...  Henderson for many helpful discussions and suggestions.  ... 
doi:10.1017/s0269888906000944 fatcat:oap5q7u5dvbgtdzhnrfr7vkd5a

Dating a Synthetic Character is Like Dating a Man

Johan F. Hoorn, Elly A. Konijn, Matthijs A. Pontier
2018 International Journal of Social Robotics  
As is, designers may use our software for believable affective virtual humans or robots.  ...  Moreover, as far as the richness of interaction possibilities in the speed-dating session allowed, our software seems to reproduce human cognitive-affective structures.  ...  Further elaboration of our approach can be found under Methods.  ... 
doi:10.1007/s12369-018-0496-1 fatcat:iy6nfpfyang4rjokruutkkaghi

Reading Framework [chapter]

2010 PISA  
P r o g r a m m e f o r I n t e r n a t i o n a l S t u d e n t A s s e s s m e n t PISA 2009 Assessment Framework  ...  Once the correct part of the text (the Walk Profile) is located, the student must correctly interpret the key to the Walk Profile to recognise the units for each number, and finally, retrieve the specified  ...  Firstly, the student must locate the part of the text in which the correct answer is found, since the question stem does not direct the student to this part of the text.  ... 
doi:10.1787/9789264062658-3-en fatcat:shchtcth2zbzlh6ps2z6nophtm

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  Although these incidents represent a very small number of cases, they demonstrate how hacking can lead to both violence as well as financial losses.Studies on hacker motivations has yet to examine how  ...  , so that these actors can interact in cyberspace harmoniously, reliably, and as a factor of sustainable development.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

Evolving Perspectives on Computers and Composition Studies: Questions for the 1990s

Mary G. French, Gail E. Hawisher, Cynthia L. Selfe
1992 College composition and communication  
Indeed, our notions of quality are probably changing as inevitably as those changes in standards that accompanied the transition from hand-inscribed manuscripts to printed texts.  ...  We avoid making decisions without carefully considering the issues affecting our students and ourselves: how, for example, we cdn provide equitable access to technology for all students in our 8 Research  ...  Acknowledgments I thank Hugh Burns, Gail Hawisher, and Cynthia Selfe for their perceptive and helpful readings of this essay. It was Hugh who saw this paper as calling for a rethinking of delivery.  ... 
doi:10.2307/358659 fatcat:arztlhpjxbdubhy6w7h6qwolmu

Classifier systems and genetic algorithms

L.B. Booker, D.E. Goldberg, J.H. Holland
1989 Artificial Intelligence  
Classifier systems are massively parallel, message-passing, rule-based systems that learn through credit assignment (the bucket brigade algorithm) and rule discovery (the genetic algorithm).  ...  environments that exhibit one or more of the following characteristics: (1) perpetually novel events accompanied by large amounts of noisy or irrelevant data; (2) continual, often real-time, requirements for  ...  In terms of the weak methods familiar to the AI community, a genetic algorithm can be thought of as a complex hierarchical generate-and-test process.  ... 
doi:10.1016/0004-3702(89)90050-7 fatcat:5rwumg7iwrbglmhr5mv6s7vfcq

Tools for Searching, Annotation and Analysis of Speech, Music, Film and Video A Survey

A. Marsden, A. Mackenzie, A. Lindsay, H. Nock, J. Coleman, G. Kochanski
2007 Literary and Linguistic Computing  
Such tools exist for speech, though with important limits to their accuracy and applicability. For music and video, researchers can make use of visualisations.  ...  This paper examines the actual and potential use of software tools in research in the arts and humanities focussing on audiovisual materials such as recorded speech, music, video and film.  ...  Such tools would need to support search in his language of interest and perhaps image-related search as well as free text search.  ... 
doi:10.1093/llc/fqm021 fatcat:oniladdzyjbzbazq5a5qwzgmoa

Characteristics of Marketing Channels: A Theoretical Framework

Nina Michaelidou, David C. Arnott, Sally Dibb
2005 Marketing Review  
This paper proposes and explores the concept of channel characteristics and suggests ways of modelling channel attributes.  ...  The limited research that does exist in this domain indicates that aspects such as risk aversion, self-confidence, variety seeking, convenience orientation, flexibility, demographics, etc. all differ measurably  ...  The discourse analysis approach has a commitment to studying social texts for their structure, such as how arguments are built within the texts and the features and recurring themes, metaphors, and tropes  ... 
doi:10.1362/1469347053294788 fatcat:m56ighnmprbh5mb3g4jxyeebju

Foundations of Dynamic Geometry

Ulrich Kortenkamp
2000 Journal für Mathematik-Didaktik  
You can compensate for this by handing out printed exercise sheets that suggest starting points for geometric exploration, or even interactive web pages 11.3.  ...  These contain the additional data that is needed for them, like the coordinates for a point, the matrix of a conic, or the text of a text label, and override the display method.  ...  Can be used inside web pages, but also for standalone applications. Locus The path of a dependent point while moving a movable object.  ... 
doi:10.1007/bf03338916 fatcat:pqnhh26dyrfkvpyuq646jepeji
« Previous Showing results 1 — 15 out of 166 results